Static task
static1
Behavioral task
behavioral1
Sample
4e6a4a2a72d6b2fbc61f1f5afb679c20.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e6a4a2a72d6b2fbc61f1f5afb679c20.exe
Resource
win10v2004-20231222-en
General
-
Target
4e6a4a2a72d6b2fbc61f1f5afb679c20
-
Size
186KB
-
MD5
4e6a4a2a72d6b2fbc61f1f5afb679c20
-
SHA1
e820132af11fe8d765329f0202117c0de34ba540
-
SHA256
6063b82fb385553f6c17f5302462fedb65f89ce4d7b29a46cdd391614ad0cee7
-
SHA512
00c94575c5b50d34cb7197d459178259b42d7481398b415314b8c674a64793309840b68aa45493cd01bbf626e23d70d6036b98a9863ab93a261b5a0e2ab46b82
-
SSDEEP
3072:Ch7bFQ4h1ny7B+O0Y3eDjGyhz/UgiDON9iRWbHNmOdT2BuHIKpvVAkN4O9TuA6/b:Ch/FQ4hA0OLQjTz/UgiWiRWbHNmOdT2J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e6a4a2a72d6b2fbc61f1f5afb679c20
Files
-
4e6a4a2a72d6b2fbc61f1f5afb679c20.exe windows:4 windows x86 arch:x86
4d59a863361c9d60f3ec03eb81c2742b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
kernel32
CloseHandle
CreateRemoteThread
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindResourceA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
ReadProcessMemory
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualProtect
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WaitForSingleObject
msvcrt
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
_winmajor
abort
atexit
calloc
fputc
fputs
free
fwrite
malloc
memcpy
memset
realloc
signal
sprintf
strcmp
strcpy
vfprintf
Sections
.text Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 324B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE